If I had a load balancer mapping many incoming client connections to fewer backend connections to Squid, would that cause trouble for the digest authentication logic? In particular, if requests from two different authenticated users were mapped onto a single connection from load balancer to Squid (and interleaved?) would that cause trouble?

It seems like there is some cached auth state associated with each connection, and that the connection multiplexing must be interacting badly with that. Is there a way to suppress the caching of this auth state?

Henrik Nordstrom wrote:
tor 2006-08-10 klockan 16:52 -0700 skrev Ben Drees:

Users are complaining that they are challenged to re-enter their credentials too frequently.

Then something is wrong somewhere. They should only need to enter their
credentials once, just as for basic..

I figured nonce_max_duration would set the "max session time", but the credentials challenges still seem to happen much more frequently.

The nounce duration is not a session timer as such. It's more related to
replay attacks on the digest protocol.
I notice log entries like these that seem to be correlated with the credentials challenges:

#1) authenticateValidateUser: Auth_user '0xb61430' is broken for it's scheme.
#2) authenticateValidateUser: Validating Auth_user request '(nil)'.

Are these normal sorts of log messages? What does AUTH_BROKEN mean (from the source generating example #1)?

Most likely Squid didn't like something of the Digest message sent by
the browser.

debug_options ALL,1 29,9
should give more insight into the Digest processing.

If you enable log_mime_hdrs and repeat the problem with a known password
then we can look into what the browser sent and if it makes sense or
not.

Or at mimimum log_mime_hdrs and get the relevant /407 entries. Maybe
there is something obvious.

Regards
Henrik

Reply via email to